FSIS CA #3 Test Review

FSIS CA #3 Test Review

8th Grade

14 Qs

quiz-placeholder

Similar activities

F3 ASK ( BAB 1 & BAB 2 REVISION )

F3 ASK ( BAB 1 & BAB 2 REVISION )

7th - 9th Grade

18 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

CyberSecurity Basics

CyberSecurity Basics

6th - 12th Grade

10 Qs

Quiz 1 - Prinsip dan Konsep keamanan informasi

Quiz 1 - Prinsip dan Konsep keamanan informasi

1st Grade - University

17 Qs

Unit 6 - Information Security Test Review

Unit 6 - Information Security Test Review

8th Grade

19 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

MESSAGE AUTHENTICATION

MESSAGE AUTHENTICATION

KG - University

19 Qs

Triple A: Authentication

Triple A: Authentication

8th Grade

10 Qs

FSIS CA #3 Test Review

FSIS CA #3 Test Review

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Kenneth Hood

Used 3+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1)      Which of the following terms refers to an attack using commonly known passwords in a password field?

     Brute force attack

Dictionary attack

     Ransomware attack

viral attackTest

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1)      Which of the following responses explains the CIA triad?

Confidentiality, Integrity, & Availability

Central Intelligence Agency

Confidentiality, Integrity, & Authentication

Confidentiality, Integrity, & Accountability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following responses explains the CIA triad?

Confidentiality, Integrity, & Availability

Central Intelligence Agency

Confidentiality, Integrity, & Authentication

Confidentiality, Integrity, & Accountability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are 3 qualities of strong passwords?

Length, accessibility, & uniqueness

Length, complexity, & uniqueness

Accessibility, complexity, & uniqueness

Length, complexity, & authorization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of Access Control?

Identification

Authentication

Authorization

Confidentiality

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is Step 1 in Risk Assessment?

Identify the Asset Owners

Identify the Risk Owners

Identify the Information Assets

Determine the Levels of Risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to an attacker trying all possible combinations of characters in a password field?

Rainbow tables

Brute Force attack

Dictionary attack

Hash

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers